DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» NaSHA
NaSHA
Nasha, Cubehash, SWIFFTX, Skein
Rebound Attack
The Hitchhiker's Guide to the SHA-3 Competition
NISTIR 7620 Status Report on the First Round of the SHA-3
Finding Bugs in Cryptographic Hash Function Implementations Nicky Mouha, Mohammad S Raunak, D
Grøstl – a SHA-3 Candidate
Hash Function Design Overview of the Basic Components in SHA-3 Competition
Portfolio of Optimized Cryptographic Functions Based on Keccak
Hash Functions and Gröbner Bases Cryptanalysis
Keccak, More Than Just SHA3SUM
SHA-3 Hash Competition, Round 1
The Hitchhiker's Guide to the SHA-3 Competition
Keccak and SHA-3: Code and Standard Updates
SHA-2 Will Soon Retire : the SHA-3 Song
Classification of the SHA-3 Candidates
Suga Yuji Considerations of SHA-3 Candidate's Name
The SHA-3 FIPS
Performance Analysis of the SHA-3 Candidates on Exotic Multi-Core Architectures
Top View
Program Book
Design of Crypto Primitives Based on Quasigroups 1. Introduction
Cube Attacks on Cryptographic Hash Functions Joel Lathrop
Compression Function Based on Permutations and Quasigroups
Finding Bugs in Cryptographic Hash Function Implementations Nicky Mouha, Mohammad S Raunak, D
Status Report on the First Round of the SHA-3 Cryptographic Hash Algorithm Competition
2.B Algorithm Specifications and Supporting Documentations 2.B.4
SHA-2 Will Soon Retire
2.B Algorithm Specifications and Supporting Documentations 2.B.5
Symmetric Key Cryptography PQCRYPTO Summer School on Post-Quantum Cryptography 2017
Classification of the SHA-3 Candidates
The First SHA-3 Candidate Conference Program
Improved Rebound Attack on the Finalist Grøstl